Browse our blogs
We cover it all in The Security Blog. Discover what you’ve been looking for.

Government Contractor’s Ultimate Guide to CUI
Controlled Unclassified Information (CUI) is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the…

Specula - Turning Outlook Into a C2 With One Registry Change
There exist a few singular Registry changes that any non-privileged user can make that transform the Outlook email client into a beaconing C2 agent. Given that…

Lapse of Control: Applauding PCI SSC for FAQ 1572
I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…

What is Your Compliance Kryptonite?
Understanding PCI DSS requirements and avoiding misinterpretations of security controls can be frustrating for organizations, especially when it comes to…

Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks
This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research…

dirDevil: Hiding Code and Content Within Folder Structures
Welcome back to another round of "Hiding in Plain Sight," exploring weird places to stash data or payloads. In our last edition, we explored an easy method of…

HackingDave’s Rule of Five
Implementing the Rule of Five helps you prioritize tasks that align with your long-term goals, cutting through everyday distractions and fostering personal…

The Dangers of Transition Mode
Discover the security vulnerabilities of WPA3 networks, learn how to identify and exploit them, and discover how to remediate them to protect your network from…

Playing Games with PCI Compliance Deadlines
The new version 4.0 of the PCI DSS standard that applies to organizations that handle payment cards is now mandatory as of April 01, 2024. As a QSA, I’ve heard…

Let’s Clone a Cloner...To Meet My Needs
It was my second Physical Penetration Test here at TrustedSec and I was paired with colleague Paul Burkeland. After arriving at the hotel, Paul stated that he…

Tips and Tricks on Creating Your First Conference Talk
Have you ever attended a security conference (or any conference for that matter) and thought about giving a presentation yourself, but don't know where to…

Hands On with Chip Off Non-Volatile Memory
Installing memory modules on donor boards requires precision and patience, involving heat damage prevention, thermal shock reduction, and precise soldering…
Loading...